Change Management
Change Management provides a structured process to manage modifications to IT services and infrastructure, ensuring that changes are implemented with minimal risk and disruption to business operations.
A change is any planned addition, modification, or removal of anything that could have an effect on IT services. The goal of Change Management is not to prevent changes, but to ensure they are managed in a controlled and systematic way, balancing the need for agility with the need for stability.
Benefits of Change Management
- Reduced Risk and Disruption: A formal assessment and approval process minimizes the likelihood of failed changes, service outages, and negative business impact.
- Improved Visibility and Communication: All stakeholders are kept informed about upcoming changes, which reduces surprises and helps manage expectations.
- Increased Compliance and Auditability: A complete, unalterable record of every change provides a full audit trail, which is essential for meeting regulatory and compliance requirements.
- Faster and More Successful Changes: By standardizing processes and pre-approving low-risk changes, organizations can accelerate change implementation without sacrificing stability.
Change Types and Lifecycles
Changes are categorized by risk and impact, and each type follows a tailored lifecycle to ensure the right level of oversight is applied.
- Standard Change
- Normal Change
- Emergency Change
A Standard Change is a low-risk, pre-approved change that is common and follows a standard procedure (e.g., a memory upgrade or a new user account creation). The lifecycle is streamlined for maximum efficiency.

- Submission & Planning: A request is initiated, often from a service catalog item. The process is pre-approved, so planning is minimal and focuses on scheduling, including impact analysis and resource allocation to ensure a smooth deployment.
- Implementation: The change is executed according to the defined, repeatable procedure. This may involve automated scripts or manual tasks, with close attention to minimizing user disruption.
- Review & Closure: A quick verification confirms success, and the change record is automatically closed. This step includes checking logs and confirming that the service is functioning as expected post-change.
A Normal Change is a non-standard change that requires a full assessment and authorization process (e.g., a server upgrade or a new software deployment).

- Submission & Planning: A detailed Request for Change (RFC) is submitted, outlining the justification, potential impact, implementation plan, communication strategy, and a comprehensive backout plan to revert the change if issues arise.
- Approval: The RFC is reviewed by the Change Advisory Board (CAB) to assess risk, feasibility, and resource requirements. Approval from relevant stakeholders is required before proceeding, ensuring all concerns are addressed.
- Implementation: The approved change is executed. Progress is carefully monitored, and the backout plan is kept ready for immediate use in case of unexpected problems. All activities are documented in detail.
- Review & Closure: A Post-Implementation Review (PIR) is conducted to evaluate the change's success, confirm that objectives were met, and identify any lessons learned. The record is then formally closed, providing an audit trail.
An Emergency Change must be implemented immediately to resolve a critical issue, such as a major incident. The process is expedited to restore service quickly.

- Submission & Approval: An emergency request is raised with minimal initial documentation, focusing on the immediate problem and proposed solution. Approval is expedited, often by a small emergency CAB (ECAB) or a single authorized individual, to ensure rapid response to critical issues.
- Implementation: The change is implemented urgently to resolve the issue, with a strong emphasis on restoring service as quickly as possible. Close monitoring is essential during this phase.
- Review & Closure: A full retrospective review is conducted after implementation to ensure proper documentation of the emergency, identify root causes, learn from the event, and confirm that no adverse side effects occurred. The record is then formally closed.
Common Use Cases
- Scenario 1: Standard Change
- Scenario 2: Normal Change
- Scenario 3: Emergency Change
Change: A user requests additional RAM for their virtual machine via the service catalog.
- Submission: The user submits the pre-approved "VM RAM Upgrade" request.
- Implementation: An automated script runs, allocates the additional RAM to the VM, and reboots it during a scheduled maintenance window.
- Closure: The system verifies the new RAM allocation and automatically closes the change record, notifying the user.
Change: The networking team needs to apply a security patch to a core router.
- Submission & Planning: The team submits a detailed RFC, including risk analysis, test results from a staging environment, an implementation plan for after-hours, and a backout plan.
- Approval: The CAB reviews the RFC in their weekly meeting. They approve the change, noting the successful testing and robust backout plan.
- Implementation: The team executes the change as planned.
- Review & Closure: The next morning, they conduct a PIR, confirm that network performance is stable, and formally close the change.
Change: A critical vulnerability is discovered in the company's external web server, and a patch must be applied immediately.
- Submission & Approval: The security team raises an emergency change. The on-call IT Director reviews the urgency and grants immediate approval (acting as the ECAB).
- Implementation: The patch is deployed immediately.
- Review: The following day, the ECAB convenes to retrospectively review the change, complete the documentation, and confirm that no adverse side effects occurred. The change is then formally closed.
Roles and Responsibilities
- Change Requester: Any individual who submits a Request for Change (RFC).
- Change Manager: Governs the Change Management process, facilitates CAB meetings, and ensures procedures are followed.
- Change Advisory Board (CAB): A group of stakeholders (from IT, security, business departments) who assess, prioritize, and authorize normal changes.
- Technical Implementer: The individual or team responsible for planning and executing the change.